Phishing-resistant multi factor authentication
The advent of the internet has revolutionized how people connect and interact, but it also brings various severe consequences such as data leakage when weak authentication method is implemented. Two-factor authentication(2FA) is a widely adopted method, yet vulnerabilities have been discovered to by...
Saved in:
| Main Author: | |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2025
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/7183/1/fyp_CN_2025_KEY.pdf http://eprints.utar.edu.my/7183/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1842131958533980160 |
|---|---|
| author | Kuek, En Yee |
| author_facet | Kuek, En Yee |
| author_sort | Kuek, En Yee |
| building | UTAR Library |
| collection | Institutional Repository |
| content_provider | Universiti Tunku Abdul Rahman |
| content_source | UTAR Institutional Repository |
| continent | Asia |
| country | Malaysia |
| description | The advent of the internet has revolutionized how people connect and interact, but it also brings various severe consequences such as data leakage when weak authentication method is implemented. Two-factor authentication(2FA) is a widely adopted method, yet vulnerabilities have been discovered to bypass it. Traditional 2FA typically combines something a user knows (like a password) with something they have (like a temporary verification code from a physical device). However, this approach is still susceptible to attacks such as phishing attacks, especially Real-Time Phishing(RTP) attack. Location-based multi authentication (MFA) methods have been proposed to mitigate RTP techniques that exploit traditional OTP-based verification. By replacing the OTP mechanism with a geolocation verification step, it add a layer of security to the authentication process. Limitations on previously proposed location-based multi-factor authentication are additional user step for adaptation, mobile-based, and additional costs due to hardware requirements. This paper suggests incorporating location as an extra security layer while maintaining the user-friendliness and seamlessness of existing two-factor authentication methods, thus creating a user-friendly and seamless multifactor authentication solution. The performance of this proposed authentication method is evaluated against various attacks, notably RTP attack. Area of Study: Cybersecurity, Authentication
Keywords: Multi-Factor Authentication, Real-Time Phishing Attack, MERN Stack, Location Verification, Two-factor Authentication, Phishing Attack |
| format | Final Year Project / Dissertation / Thesis |
| id | my-utar-eprints.7183 |
| institution | Universiti Tunku Abdul Rahman |
| publishDate | 2025 |
| record_format | eprints |
| spelling | my-utar-eprints.71832025-08-28T07:04:46Z Phishing-resistant multi factor authentication Kuek, En Yee T Technology (General) TD Environmental technology. Sanitary engineering TJ Mechanical engineering and machinery The advent of the internet has revolutionized how people connect and interact, but it also brings various severe consequences such as data leakage when weak authentication method is implemented. Two-factor authentication(2FA) is a widely adopted method, yet vulnerabilities have been discovered to bypass it. Traditional 2FA typically combines something a user knows (like a password) with something they have (like a temporary verification code from a physical device). However, this approach is still susceptible to attacks such as phishing attacks, especially Real-Time Phishing(RTP) attack. Location-based multi authentication (MFA) methods have been proposed to mitigate RTP techniques that exploit traditional OTP-based verification. By replacing the OTP mechanism with a geolocation verification step, it add a layer of security to the authentication process. Limitations on previously proposed location-based multi-factor authentication are additional user step for adaptation, mobile-based, and additional costs due to hardware requirements. This paper suggests incorporating location as an extra security layer while maintaining the user-friendliness and seamlessness of existing two-factor authentication methods, thus creating a user-friendly and seamless multifactor authentication solution. The performance of this proposed authentication method is evaluated against various attacks, notably RTP attack. Area of Study: Cybersecurity, Authentication Keywords: Multi-Factor Authentication, Real-Time Phishing Attack, MERN Stack, Location Verification, Two-factor Authentication, Phishing Attack 2025-01 Final Year Project / Dissertation / Thesis NonPeerReviewed application/pdf http://eprints.utar.edu.my/7183/1/fyp_CN_2025_KEY.pdf Kuek, En Yee (2025) Phishing-resistant multi factor authentication. Final Year Project, UTAR. http://eprints.utar.edu.my/7183/ |
| spellingShingle | T Technology (General) TD Environmental technology. Sanitary engineering TJ Mechanical engineering and machinery Kuek, En Yee Phishing-resistant multi factor authentication |
| title | Phishing-resistant multi factor authentication |
| title_full | Phishing-resistant multi factor authentication |
| title_fullStr | Phishing-resistant multi factor authentication |
| title_full_unstemmed | Phishing-resistant multi factor authentication |
| title_short | Phishing-resistant multi factor authentication |
| title_sort | phishing-resistant multi factor authentication |
| topic | T Technology (General) TD Environmental technology. Sanitary engineering TJ Mechanical engineering and machinery |
| url | http://eprints.utar.edu.my/7183/1/fyp_CN_2025_KEY.pdf http://eprints.utar.edu.my/7183/ |
| url_provider | http://eprints.utar.edu.my |
